1. A subfield lattice attack on overstretched NTRU assumptions;Albrecht,2016
2. NTRU in constrained devices;Bailey,2001
3. On the efficiency of provably secure NTRU;Cabarcas,2014
4. On the efficiency of provably secure NTRU;Cabarcas,2014
5. Key recovery attacks against NTRU-based somewhat homomorphic encryption schemes;Chenal,2015